Pantomimic fossils in modern human communication
نویسندگان
چکیده
منابع مشابه
Pantomimic Gestures for Human-Robot Interaction
This work introduces a pantomimic gesture interface, which classifies human hand gestures using unmanned aerial vehicle (UAV) behaviour recordings as training data. We argue that pantomimic gestures are more intuitive than iconic gestures and show that a pantomimic gesture recognition strategy using micro UAV behaviour recordings can be more robust than one trained directly using hand gestures....
متن کاملModern Communication Technology and National Security In the Middle East
One of the characteristics of the modern international systems is the undeniable role the new communication technologies play in different sections of human societies. Modern communication technologies such as satellites and computers have challenged the national authority and sovereignty of Vestfallian states. Although national states, specially, in the third world countries, extremely resist...
متن کاملGenes, Fossils, and Culture. An Overview of the Evidence for Neandertal–Modern Human Interaction and Admixture
This paper re-examines current arguments concerning the evidence for Neandertal–modern human interaction and admixture. While most researchers now agree that the ancestry of all present day humans can be traced back to African late Middle Pleistocene populations, at a time when the remainder of Eurasia was inhabited by ‘archaic humans’, most notably the Neandertals, issues that remain to be res...
متن کاملIntelligence in Modern Communication Systems
Modern communication systems encompass noise suppression algorithms to compensate for recording and transmission errors as well as multimedia data representation modules offering both expressive and discriminating capabilities. Fusion of decisions derived by mono-modal detectors and features extracted separately for each data type should be supported. In addition, modern terminals should be equ...
متن کاملCryptography in Modern Communication Systems
It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophical Transactions of the Royal Society B: Biological Sciences
سال: 2021
ISSN: 0962-8436,1471-2970
DOI: 10.1098/rstb.2020.0204